Common use of ACCESS TO SECURITY LOGS AND REPORTS Clause in Contracts

ACCESS TO SECURITY LOGS AND REPORTS. a. The Contractor shall provide reports on a schedule specified in the SLA to the Contractor directly related to the infrastructure that the Contractor controls upon which the Purchasing Entity’s account resides. Unless otherwise agreed to in the SLA, the Contractor shall provide the public jurisdiction a history or all API calls for the Purchasing Entity account that includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters and the response elements returned by the Contractor. The report will be sufficient to enable the Purchasing Entity to perform security analysis, resource change tracking and compliance auditing b. The Contractor and the Purchasing Entity recognize that security responsibilities are shared. The Contractor is responsible for providing a secure infrastructure. The Purchasing Entity is responsible for its secure guest operating system, firewalls and other logs captured within the guest operating system. Specific shared responsibilities are identified within the SLA.

Appears in 7 contracts

Samples: Professional Services, Professional Services, Cooperative Contract

AutoNDA by SimpleDocs

ACCESS TO SECURITY LOGS AND REPORTS. a. The If required by the applicable SLA, the Contractor shall provide reports on a schedule specified in the SLA agreed to by the Contractor parties, directly related to the infrastructure that the Contractor controls upon which the Purchasing Entity’s account resides. Unless otherwise agreed to in If required by the SLA, the Contractor shall provide the public jurisdiction a history or all API calls for the Purchasing Entity account Data that includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters and the response elements returned by the Contractor. The report will be sufficient to enable the Purchasing Entity to perform security analysis, resource change tracking and compliance auditing b. The Contractor and the Purchasing Entity recognize that security responsibilities are shared. The Contractor is responsible for providing a secure infrastructure. The Purchasing Entity is responsible for its secure guest operating system, firewalls and other logs captured within the guest operating system. Specific shared responsibilities are identified within the SLA.

Appears in 1 contract

Samples: Master Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!